line |
stmt |
bran |
cond |
sub |
pod |
time |
code |
1
|
|
|
|
|
|
|
# ************************************************************************* |
2
|
|
|
|
|
|
|
# Copyright (c) 2014-2015, SUSE LLC |
3
|
|
|
|
|
|
|
# |
4
|
|
|
|
|
|
|
# All rights reserved. |
5
|
|
|
|
|
|
|
# |
6
|
|
|
|
|
|
|
# Redistribution and use in source and binary forms, with or without |
7
|
|
|
|
|
|
|
# modification, are permitted provided that the following conditions are met: |
8
|
|
|
|
|
|
|
# |
9
|
|
|
|
|
|
|
# 1. Redistributions of source code must retain the above copyright notice, |
10
|
|
|
|
|
|
|
# this list of conditions and the following disclaimer. |
11
|
|
|
|
|
|
|
# |
12
|
|
|
|
|
|
|
# 2. Redistributions in binary form must reproduce the above copyright |
13
|
|
|
|
|
|
|
# notice, this list of conditions and the following disclaimer in the |
14
|
|
|
|
|
|
|
# documentation and/or other materials provided with the distribution. |
15
|
|
|
|
|
|
|
# |
16
|
|
|
|
|
|
|
# 3. Neither the name of SUSE LLC nor the names of its contributors may be |
17
|
|
|
|
|
|
|
# used to endorse or promote products derived from this software without |
18
|
|
|
|
|
|
|
# specific prior written permission. |
19
|
|
|
|
|
|
|
# |
20
|
|
|
|
|
|
|
# THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" |
21
|
|
|
|
|
|
|
# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE |
22
|
|
|
|
|
|
|
# IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE |
23
|
|
|
|
|
|
|
# ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE |
24
|
|
|
|
|
|
|
# LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR |
25
|
|
|
|
|
|
|
# CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF |
26
|
|
|
|
|
|
|
# SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS |
27
|
|
|
|
|
|
|
# INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN |
28
|
|
|
|
|
|
|
# CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) |
29
|
|
|
|
|
|
|
# ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE |
30
|
|
|
|
|
|
|
# POSSIBILITY OF SUCH DAMAGE. |
31
|
|
|
|
|
|
|
# ************************************************************************* |
32
|
|
|
|
|
|
|
|
33
|
|
|
|
|
|
|
package App::Dochazka::REST::Auth; |
34
|
|
|
|
|
|
|
|
35
|
41
|
|
|
41
|
|
13897
|
use strict; |
|
41
|
|
|
|
|
128
|
|
|
41
|
|
|
|
|
1046
|
|
36
|
41
|
|
|
41
|
|
198
|
use warnings; |
|
41
|
|
|
|
|
78
|
|
|
41
|
|
|
|
|
1039
|
|
37
|
|
|
|
|
|
|
|
38
|
41
|
|
|
41
|
|
193
|
use App::CELL qw( $CELL $log $meta $site ); |
|
41
|
|
|
|
|
109
|
|
|
41
|
|
|
|
|
3709
|
|
39
|
41
|
|
|
41
|
|
271
|
use App::Dochazka::REST; |
|
41
|
|
|
|
|
77
|
|
|
41
|
|
|
|
|
1362
|
|
40
|
41
|
|
|
41
|
|
231
|
use App::Dochazka::REST::ConnBank qw( $dbix_conn conn_status ); |
|
41
|
|
|
|
|
97
|
|
|
41
|
|
|
|
|
3131
|
|
41
|
41
|
|
|
41
|
|
252
|
use App::Dochazka::REST::ACL qw( check_acl ); |
|
41
|
|
|
|
|
84
|
|
|
41
|
|
|
|
|
1583
|
|
42
|
41
|
|
|
41
|
|
229
|
use App::Dochazka::REST::LDAP qw( ldap_exists ldap_search ldap_auth ); |
|
41
|
|
|
|
|
86
|
|
|
41
|
|
|
|
|
1783
|
|
43
|
41
|
|
|
41
|
|
220
|
use App::Dochazka::REST::Model::Employee qw( autocreate_employee nick_exists ); |
|
41
|
|
|
|
|
82
|
|
|
41
|
|
|
|
|
1600
|
|
44
|
41
|
|
|
41
|
|
218
|
use Authen::Passphrase::SaltedDigest; |
|
41
|
|
|
|
|
86
|
|
|
41
|
|
|
|
|
828
|
|
45
|
41
|
|
|
41
|
|
187
|
use Data::Dumper; |
|
41
|
|
|
|
|
86
|
|
|
41
|
|
|
|
|
1381
|
|
46
|
41
|
|
|
41
|
|
231
|
use Params::Validate qw(:all); |
|
41
|
|
|
|
|
83
|
|
|
41
|
|
|
|
|
4976
|
|
47
|
41
|
|
|
41
|
|
260
|
use Try::Tiny; |
|
41
|
|
|
|
|
81
|
|
|
41
|
|
|
|
|
1742
|
|
48
|
41
|
|
|
41
|
|
233
|
use Web::Machine::Util qw( create_header ); |
|
41
|
|
|
|
|
77
|
|
|
41
|
|
|
|
|
397
|
|
49
|
41
|
|
|
41
|
|
12405
|
use Web::MREST::InitRouter qw( $resources ); |
|
41
|
|
|
|
|
86
|
|
|
41
|
|
|
|
|
2810
|
|
50
|
|
|
|
|
|
|
|
51
|
|
|
|
|
|
|
# methods/attributes not defined in this module will be inherited from: |
52
|
41
|
|
|
41
|
|
243
|
use parent 'Web::MREST::Entity'; |
|
41
|
|
|
|
|
77
|
|
|
41
|
|
|
|
|
235
|
|
53
|
|
|
|
|
|
|
|
54
|
|
|
|
|
|
|
|
55
|
|
|
|
|
|
|
|
56
|
|
|
|
|
|
|
|
57
|
|
|
|
|
|
|
=head1 NAME |
58
|
|
|
|
|
|
|
|
59
|
|
|
|
|
|
|
App::Dochazka::REST::Auth - HTTP request authentication and authorization |
60
|
|
|
|
|
|
|
|
61
|
|
|
|
|
|
|
|
62
|
|
|
|
|
|
|
|
63
|
|
|
|
|
|
|
|
64
|
|
|
|
|
|
|
=head1 DESCRIPTION |
65
|
|
|
|
|
|
|
|
66
|
|
|
|
|
|
|
This package, which is between L<Web::MREST::Entity> and |
67
|
|
|
|
|
|
|
L<Web::Dochazka::REST::Dispatch> in the chain of inheritance, provides the |
68
|
|
|
|
|
|
|
'is_authorized' and 'forbidden' methods called by L<Web::Machine> on each |
69
|
|
|
|
|
|
|
incoming HTTP request. |
70
|
|
|
|
|
|
|
|
71
|
|
|
|
|
|
|
|
72
|
|
|
|
|
|
|
|
73
|
|
|
|
|
|
|
|
74
|
|
|
|
|
|
|
=head1 METHODS |
75
|
|
|
|
|
|
|
|
76
|
|
|
|
|
|
|
|
77
|
|
|
|
|
|
|
=head2 is_authorized |
78
|
|
|
|
|
|
|
|
79
|
|
|
|
|
|
|
This overrides the L<Web::Machine> method of the same name. |
80
|
|
|
|
|
|
|
|
81
|
|
|
|
|
|
|
Authenticate the originator of the request, using HTTP Basic Authentication. |
82
|
|
|
|
|
|
|
Upon successful authentication, check that the user (employee) exists in |
83
|
|
|
|
|
|
|
the database (create if necessary) and retrieve her EID. Push the EID and |
84
|
|
|
|
|
|
|
current privilege level onto the context. Get the user's L<DBIx::Connector> |
85
|
|
|
|
|
|
|
object and push that onto the context, too. |
86
|
|
|
|
|
|
|
|
87
|
|
|
|
|
|
|
=cut |
88
|
|
|
|
|
|
|
|
89
|
|
|
|
|
|
|
sub is_authorized { |
90
|
0
|
|
|
0
|
1
|
|
my ( $self, $auth_header ) = @_; |
91
|
0
|
|
|
|
|
|
$log->debug( "Entering " . __PACKAGE__ . "::is_authorized" ); |
92
|
|
|
|
|
|
|
|
93
|
|
|
|
|
|
|
# get database connection for this HTTP request |
94
|
0
|
|
|
|
|
|
App::Dochazka::REST::ConnBank::init_singleton(); |
95
|
|
|
|
|
|
|
|
96
|
0
|
0
|
|
|
|
|
if ( ! $meta->META_DOCHAZKA_UNIT_TESTING ) { |
97
|
0
|
0
|
|
|
|
|
return 1 if $self->_validate_session; |
98
|
|
|
|
|
|
|
} |
99
|
0
|
0
|
|
|
|
|
if ( $auth_header ) { |
100
|
0
|
|
|
|
|
|
$log->debug("is_authorized: auth header is $auth_header" ); |
101
|
0
|
|
|
|
|
|
my $username = $auth_header->username; |
102
|
0
|
|
|
|
|
|
my $password = $auth_header->password; |
103
|
0
|
|
|
|
|
|
my $auth_status = $self->_authenticate( $username, $password ); |
104
|
0
|
0
|
|
|
|
|
if ( $auth_status->ok ) { |
105
|
0
|
|
|
|
|
|
my $emp = $auth_status->payload; |
106
|
0
|
|
|
|
|
|
$self->push_onto_context( { |
107
|
|
|
|
|
|
|
current => $emp->TO_JSON, |
108
|
|
|
|
|
|
|
current_obj => $emp, |
109
|
|
|
|
|
|
|
current_priv => $emp->priv( $dbix_conn ), |
110
|
|
|
|
|
|
|
dbix_conn => $dbix_conn, |
111
|
|
|
|
|
|
|
} ); |
112
|
0
|
0
|
|
|
|
|
$self->_init_session( $emp ) unless $meta->META_DOCHAZKA_UNIT_TESTING; |
113
|
0
|
|
|
|
|
|
return 1; |
114
|
|
|
|
|
|
|
} else { |
115
|
0
|
|
|
|
|
|
$log->error( |
116
|
|
|
|
|
|
|
"_authenticate returned non-OK status. The entire status object is " . |
117
|
|
|
|
|
|
|
Dumper( $auth_status ) |
118
|
|
|
|
|
|
|
); |
119
|
|
|
|
|
|
|
} |
120
|
|
|
|
|
|
|
} |
121
|
0
|
|
|
|
|
|
return create_header( |
122
|
|
|
|
|
|
|
'WWWAuthenticate' => [ |
123
|
|
|
|
|
|
|
'Basic' => ( |
124
|
|
|
|
|
|
|
realm => $site->DOCHAZKA_BASIC_AUTH_REALM |
125
|
|
|
|
|
|
|
) |
126
|
|
|
|
|
|
|
] |
127
|
|
|
|
|
|
|
); |
128
|
|
|
|
|
|
|
} |
129
|
|
|
|
|
|
|
|
130
|
|
|
|
|
|
|
|
131
|
|
|
|
|
|
|
=head3 _init_session |
132
|
|
|
|
|
|
|
|
133
|
|
|
|
|
|
|
Initialize the session. Takes an employee object. |
134
|
|
|
|
|
|
|
|
135
|
|
|
|
|
|
|
=cut |
136
|
|
|
|
|
|
|
|
137
|
|
|
|
|
|
|
sub _init_session { |
138
|
0
|
|
|
0
|
|
|
my $self = shift; |
139
|
0
|
|
|
|
|
|
$log->debug( "Entering " . __PACKAGE__ . "::_init_session" ); |
140
|
|
|
|
|
|
|
|
141
|
0
|
|
|
|
|
|
my ( $emp ) = validate_pos( @_, { type => HASHREF, can => 'eid' } ); |
142
|
|
|
|
|
|
|
|
143
|
0
|
|
|
|
|
|
my $r = $self->request; |
144
|
0
|
|
|
|
|
|
my $ip_addr = $r->{'env'}->{'REMOTE_ADDR'}; |
145
|
0
|
|
|
|
|
|
my $session = $r->{'env'}->{'psgix.session'}; |
146
|
0
|
|
|
|
|
|
my $eid = $emp->eid; |
147
|
|
|
|
|
|
|
|
148
|
0
|
|
|
|
|
|
$session->{'eid'} = $eid; |
149
|
0
|
|
|
|
|
|
$session->{'ip_addr'} = $ip_addr; |
150
|
0
|
|
|
|
|
|
$session->{'last_seen'} = time; |
151
|
|
|
|
|
|
|
|
152
|
0
|
|
|
|
|
|
$log->info( "Initialized new session, EID $eid" ); |
153
|
|
|
|
|
|
|
|
154
|
0
|
|
|
|
|
|
return; |
155
|
|
|
|
|
|
|
} |
156
|
|
|
|
|
|
|
|
157
|
|
|
|
|
|
|
|
158
|
|
|
|
|
|
|
=head3 _validate_session |
159
|
|
|
|
|
|
|
|
160
|
|
|
|
|
|
|
Validate the session |
161
|
|
|
|
|
|
|
|
162
|
|
|
|
|
|
|
=cut |
163
|
|
|
|
|
|
|
|
164
|
|
|
|
|
|
|
sub _validate_session { |
165
|
0
|
|
|
0
|
|
|
my ( $self ) = @_; |
166
|
0
|
|
|
|
|
|
$log->debug( "Entering " . __PACKAGE__ . "::_validate_session" ); |
167
|
|
|
|
|
|
|
|
168
|
0
|
|
|
|
|
|
my $r = $self->request; |
169
|
|
|
|
|
|
|
|
170
|
0
|
|
|
|
|
|
my $remote_addr = $r->{'env'}->{'REMOTE_ADDR'}; |
171
|
|
|
|
|
|
|
|
172
|
0
|
|
|
|
|
|
my $session = $r->{'env'}->{'psgix.session'}; |
173
|
0
|
|
|
|
|
|
$log->debug( "Session is " . Dumper( $session ) ); |
174
|
|
|
|
|
|
|
|
175
|
0
|
0
|
|
|
|
|
return 0 unless %$session; |
176
|
0
|
0
|
|
|
|
|
return 0 unless _is_fresh( $session->{'last_seen'} ); |
177
|
0
|
0
|
|
|
|
|
return 0 unless $session->{'ip_addr'} eq $remote_addr; |
178
|
0
|
0
|
0
|
|
|
|
return 0 unless exists( $session->{'eid'} ) and $session->{'eid'}; |
179
|
|
|
|
|
|
|
|
180
|
|
|
|
|
|
|
$log->info( "Detected valid existing session" . |
181
|
|
|
|
|
|
|
", EID " . $session->{'eid'} . |
182
|
0
|
|
|
|
|
|
", last seen " . $session->{'last_seen'} |
183
|
|
|
|
|
|
|
); |
184
|
|
|
|
|
|
|
|
185
|
0
|
|
|
|
|
|
$session->{'last_seen'} = time; |
186
|
|
|
|
|
|
|
|
187
|
0
|
|
|
|
|
|
my $emp = App::Dochazka::REST::Model::Employee->load_by_eid( $dbix_conn, $session->{'eid'} )->payload; |
188
|
0
|
0
|
|
|
|
|
die "missing employee object in session management" |
189
|
|
|
|
|
|
|
unless $emp->isa( "App::Dochazka::REST::Model::Employee" ); |
190
|
0
|
|
|
|
|
|
$self->push_onto_context( { |
191
|
|
|
|
|
|
|
current => $emp->TO_JSON, |
192
|
|
|
|
|
|
|
current_obj => $emp, |
193
|
|
|
|
|
|
|
current_priv => $emp->priv( $dbix_conn ), |
194
|
|
|
|
|
|
|
dbix_conn => $dbix_conn, |
195
|
|
|
|
|
|
|
} ); |
196
|
|
|
|
|
|
|
|
197
|
0
|
|
|
|
|
|
return 1; |
198
|
|
|
|
|
|
|
} |
199
|
|
|
|
|
|
|
|
200
|
|
|
|
|
|
|
|
201
|
|
|
|
|
|
|
=head3 _is_fresh |
202
|
|
|
|
|
|
|
|
203
|
|
|
|
|
|
|
Takes a single argument, which is assumed to be number of seconds since |
204
|
|
|
|
|
|
|
epoch when the session was last seen. This is compared to "now" and if the |
205
|
|
|
|
|
|
|
difference is greater than the DOCHAZKA_REST_SESSION_EXPIRATION_TIME site |
206
|
|
|
|
|
|
|
parameter, the return value is false, otherwise true. |
207
|
|
|
|
|
|
|
|
208
|
|
|
|
|
|
|
=cut |
209
|
|
|
|
|
|
|
|
210
|
|
|
|
|
|
|
sub _is_fresh { |
211
|
0
|
|
|
0
|
|
|
$log->debug( "Entering " . __PACKAGE__ . "::_is_fresh" ); |
212
|
0
|
|
|
|
|
|
my ( $last_seen ) = validate_pos( @_, { type => SCALAR } ); |
213
|
0
|
0
|
|
|
|
|
if ( time - $last_seen > $site->DOCHAZKA_REST_SESSION_EXPIRATION_TIME ) { |
214
|
0
|
|
|
|
|
|
$log->error( "Session expired!" ); |
215
|
0
|
|
|
|
|
|
return 0; |
216
|
|
|
|
|
|
|
} |
217
|
0
|
|
|
|
|
|
return 1; |
218
|
|
|
|
|
|
|
} |
219
|
|
|
|
|
|
|
|
220
|
|
|
|
|
|
|
|
221
|
|
|
|
|
|
|
=head3 _authenticate |
222
|
|
|
|
|
|
|
|
223
|
|
|
|
|
|
|
Authenticate the nick associated with an incoming REST request. Takes a nick |
224
|
|
|
|
|
|
|
and a password (i.e., a set of credentials). Returns a status object, which |
225
|
|
|
|
|
|
|
will have level 'OK' on success (with employee object in the payload), 'NOT_OK' |
226
|
|
|
|
|
|
|
on failure. In the latter case, there will be a declared status. |
227
|
|
|
|
|
|
|
|
228
|
|
|
|
|
|
|
=cut |
229
|
|
|
|
|
|
|
|
230
|
|
|
|
|
|
|
sub _authenticate { |
231
|
0
|
|
|
0
|
|
|
my ( $self, $nick, $password ) = @_; |
232
|
0
|
|
|
|
|
|
my ( $status, $emp ); |
233
|
0
|
|
|
|
|
|
$log->debug( "Entering " . __PACKAGE__ . "::_authenticate" ); |
234
|
|
|
|
|
|
|
|
235
|
|
|
|
|
|
|
# empty credentials: fall back to demo/demo |
236
|
0
|
0
|
|
|
|
|
if ( $nick ) { |
237
|
0
|
|
|
|
|
|
$log->notice( "Login attempt from $nick" ); |
238
|
|
|
|
|
|
|
} else { |
239
|
0
|
|
|
|
|
|
$log->notice( "Login attempt from (anonymous) -- defaulting to demo/demo" ); |
240
|
0
|
|
|
|
|
|
$nick = 'demo'; |
241
|
0
|
|
|
|
|
|
$password = 'demo'; |
242
|
|
|
|
|
|
|
} |
243
|
|
|
|
|
|
|
|
244
|
0
|
|
|
|
|
|
$log->debug( "\$site->DOCHAZKA_LDAP is " . $site->DOCHAZKA_LDAP ); |
245
|
|
|
|
|
|
|
|
246
|
|
|
|
|
|
|
# check if LDAP is enabled and if the employee exists in LDAP |
247
|
0
|
0
|
0
|
|
|
|
if ( ! $meta->META_DOCHAZKA_UNIT_TESTING and |
|
|
|
0
|
|
|
|
|
248
|
|
|
|
|
|
|
$site->DOCHAZKA_LDAP and |
249
|
|
|
|
|
|
|
ldap_exists( $nick ) |
250
|
|
|
|
|
|
|
) { |
251
|
|
|
|
|
|
|
|
252
|
0
|
|
|
|
|
|
$log->info( "Detected authentication attempt from $nick, a known LDAP user" ); |
253
|
|
|
|
|
|
|
#$log->debug( "Password provided: $password" ); |
254
|
|
|
|
|
|
|
|
255
|
|
|
|
|
|
|
# - authenticate by LDAP bind |
256
|
0
|
0
|
|
|
|
|
if ( ldap_auth( $nick, $password ) ) { |
257
|
|
|
|
|
|
|
# successful LDAP auth: if the employee doesn't already exist in |
258
|
|
|
|
|
|
|
# the database, possibly autocreate |
259
|
0
|
|
|
|
|
|
$status = autocreate_employee( $dbix_conn, $nick ); |
260
|
0
|
0
|
|
|
|
|
return $status unless $status->ok; |
261
|
|
|
|
|
|
|
} else { |
262
|
0
|
|
|
|
|
|
return $CELL->status_not_ok( 'DOCHAZKA_EMPLOYEE_AUTH' ); |
263
|
|
|
|
|
|
|
} |
264
|
|
|
|
|
|
|
|
265
|
|
|
|
|
|
|
# load the employee object |
266
|
0
|
|
|
|
|
|
my $emp = App::Dochazka::REST::Model::Employee->load_by_nick( $dbix_conn, $nick )->payload; |
267
|
0
|
0
|
|
|
|
|
die "missing employee object in _authenticate" unless ref($emp) eq "App::Dochazka::REST::Model::Employee"; |
268
|
0
|
|
|
|
|
|
return $CELL->status_ok( 'DOCHAZKA_EMPLOYEE_AUTH', payload => $emp ); |
269
|
|
|
|
|
|
|
} |
270
|
|
|
|
|
|
|
|
271
|
|
|
|
|
|
|
# if not, authenticate against the password stored in the employee object. |
272
|
|
|
|
|
|
|
else { |
273
|
|
|
|
|
|
|
|
274
|
0
|
|
|
|
|
|
$log->notice( "Employee $nick not found in LDAP; reverting to internal auth" ); |
275
|
|
|
|
|
|
|
|
276
|
|
|
|
|
|
|
# - check if this employee exists in database |
277
|
0
|
|
|
|
|
|
my $emp = nick_exists( $dbix_conn, $nick ); |
278
|
|
|
|
|
|
|
|
279
|
0
|
0
|
0
|
|
|
|
if ( ! defined( $emp ) or ! $emp->isa( 'App::Dochazka::REST::Model::Employee' ) ) { |
280
|
0
|
|
|
|
|
|
$log->notice( "Rejecting login attempt from unknown user $nick" ); |
281
|
0
|
|
|
|
|
|
$self->mrest_declare_status( explanation => "Authentication failed for user $nick", permanent => 1 ); |
282
|
0
|
|
|
|
|
|
return $CELL->status_not_ok; |
283
|
|
|
|
|
|
|
} |
284
|
|
|
|
|
|
|
|
285
|
|
|
|
|
|
|
# - the password might be empty |
286
|
0
|
0
|
|
|
|
|
$password = '' unless defined( $password ); |
287
|
0
|
|
|
|
|
|
my $passhash = $emp->passhash; |
288
|
0
|
0
|
|
|
|
|
$passhash = '' unless defined( $passhash ); |
289
|
|
|
|
|
|
|
|
290
|
|
|
|
|
|
|
# - check password against passhash |
291
|
0
|
|
|
|
|
|
my ( $ppr, $status ); |
292
|
|
|
|
|
|
|
try { |
293
|
0
|
|
|
0
|
|
|
$ppr = Authen::Passphrase::SaltedDigest->new( |
294
|
|
|
|
|
|
|
algorithm => "SHA-512", |
295
|
|
|
|
|
|
|
salt_hex => $emp->salt, |
296
|
|
|
|
|
|
|
hash_hex => $emp->passhash, |
297
|
|
|
|
|
|
|
); |
298
|
|
|
|
|
|
|
} catch { |
299
|
0
|
|
|
0
|
|
|
$status = $CELL->status_err( 'DOCHAZKA_PASSPHRASE_EXCEPTION', args => [ $_ ] ); |
300
|
0
|
|
|
|
|
|
}; |
301
|
|
|
|
|
|
|
|
302
|
0
|
0
|
|
|
|
|
if ( ref( $ppr ) ne 'Authen::Passphrase::SaltedDigest' ) { |
303
|
0
|
|
|
|
|
|
$log->crit( "employee $nick has invalid passhash and/or salt" ); |
304
|
0
|
|
|
|
|
|
return $CELL->status_not_ok( 'DOCHAZKA_EMPLOYEE_AUTH' ); |
305
|
|
|
|
|
|
|
} |
306
|
0
|
0
|
|
|
|
|
if ( $ppr->match( $password ) ) { |
307
|
0
|
|
|
|
|
|
$log->notice( "Internal auth successful for employee $nick" ); |
308
|
0
|
|
|
|
|
|
return $CELL->status_ok( 'DOCHAZKA_EMPLOYEE_AUTH', payload => $emp ); |
309
|
|
|
|
|
|
|
} else { |
310
|
0
|
|
|
|
|
|
$self->mrest_declare_status( explanation => |
311
|
|
|
|
|
|
|
"Internal auth failed for known employee $nick (mistyped password?)" |
312
|
|
|
|
|
|
|
); |
313
|
0
|
|
|
|
|
|
return $CELL->status_not_ok; |
314
|
|
|
|
|
|
|
} |
315
|
|
|
|
|
|
|
} |
316
|
|
|
|
|
|
|
} |
317
|
|
|
|
|
|
|
|
318
|
|
|
|
|
|
|
|
319
|
|
|
|
|
|
|
=head2 forbidden |
320
|
|
|
|
|
|
|
|
321
|
|
|
|
|
|
|
This overrides the L<Web::Machine> method of the same name. |
322
|
|
|
|
|
|
|
|
323
|
|
|
|
|
|
|
Authorization (ACL check) method. |
324
|
|
|
|
|
|
|
|
325
|
|
|
|
|
|
|
First, parse the path and look at the method to determine which controller |
326
|
|
|
|
|
|
|
action the user is asking us to perform. Each controller action has an ACL |
327
|
|
|
|
|
|
|
associated with it, from which we can determine whether employees of each of |
328
|
|
|
|
|
|
|
the four different privilege levels are authorized to perform that action. |
329
|
|
|
|
|
|
|
|
330
|
|
|
|
|
|
|
Requests for non-existent resources will always pass the ACL check. |
331
|
|
|
|
|
|
|
|
332
|
|
|
|
|
|
|
=cut |
333
|
|
|
|
|
|
|
|
334
|
|
|
|
|
|
|
sub forbidden { |
335
|
0
|
|
|
0
|
1
|
|
my ( $self ) = @_; |
336
|
0
|
|
|
|
|
|
$log->debug( "Entering " . __PACKAGE__ . "::forbidden" ); |
337
|
|
|
|
|
|
|
|
338
|
0
|
|
|
|
|
|
my $method = $self->context->{'method'}; |
339
|
0
|
|
|
|
|
|
my $resource_name = $self->context->{'resource_name'}; |
340
|
|
|
|
|
|
|
|
341
|
|
|
|
|
|
|
# if there is no handler on the context, the URL is invalid so we |
342
|
|
|
|
|
|
|
# just pass on the request |
343
|
0
|
0
|
|
|
|
|
if ( not exists $self->context->{'handler'} ) { |
344
|
0
|
|
|
|
|
|
$log->debug("forbidden: no handler on context, passing on this request"); |
345
|
0
|
|
|
|
|
|
return 0; |
346
|
|
|
|
|
|
|
} |
347
|
|
|
|
|
|
|
|
348
|
0
|
|
|
|
|
|
my $resource_def = $resources->{$resource_name}->{$method}; |
349
|
|
|
|
|
|
|
|
350
|
|
|
|
|
|
|
# now we get the ACL profile. There are three possibilities: |
351
|
|
|
|
|
|
|
# 1. acl_profile property does not exist => fail |
352
|
|
|
|
|
|
|
# 2. single ACL profile for the entire resource |
353
|
|
|
|
|
|
|
# 3. separate ACL profiles for each HTTP method |
354
|
0
|
|
|
|
|
|
my ( $acl_profile_prop, $acl_profile ); |
355
|
|
|
|
|
|
|
SKIP: { |
356
|
|
|
|
|
|
|
|
357
|
|
|
|
|
|
|
# check acl_profile property |
358
|
0
|
0
|
|
|
|
|
if ( exists( $resource_def->{'acl_profile'} ) ) { |
|
0
|
|
|
|
|
|
|
359
|
0
|
|
|
|
|
|
$acl_profile_prop = $resource_def->{'acl_profile'}; |
360
|
|
|
|
|
|
|
} else { |
361
|
0
|
|
|
|
|
|
$log->notice( "Resource $resource_name has no acl_profile property; ACL check will fail" ); |
362
|
0
|
|
|
|
|
|
last SKIP; |
363
|
|
|
|
|
|
|
} |
364
|
|
|
|
|
|
|
|
365
|
|
|
|
|
|
|
# got the property, process it |
366
|
0
|
0
|
|
|
|
|
if ( ! ref( $acl_profile_prop ) ) { |
|
|
0
|
|
|
|
|
|
367
|
0
|
|
|
|
|
|
$acl_profile = $acl_profile_prop; |
368
|
0
|
|
0
|
|
|
|
$log->debug( "ACL profile for all methods is " . ( $acl_profile || "undefined" ) ); |
369
|
|
|
|
|
|
|
} elsif ( ref( $acl_profile_prop ) eq 'HASH' ) { |
370
|
0
|
|
|
|
|
|
$acl_profile = $acl_profile_prop->{$method}; |
371
|
0
|
|
0
|
|
|
|
$log->debug( "ACL profile for $method requests is " . ( $acl_profile || "undefined" ) ); |
372
|
|
|
|
|
|
|
} else { |
373
|
|
|
|
|
|
|
$self->mrest_declare_status( code => 500, explanation => |
374
|
0
|
|
|
|
|
|
"Cannot determine ACL profile of resource!!! Path is " . $self->context->{'path'}, |
375
|
|
|
|
|
|
|
permanent => 1 ); |
376
|
0
|
|
|
|
|
|
return 1; |
377
|
|
|
|
|
|
|
} |
378
|
|
|
|
|
|
|
} |
379
|
|
|
|
|
|
|
# push ACL profile onto context |
380
|
0
|
|
|
|
|
|
$self->push_onto_context( { 'acl_profile' => $acl_profile } ); |
381
|
|
|
|
|
|
|
|
382
|
|
|
|
|
|
|
# determine privlevel of our user |
383
|
0
|
|
|
|
|
|
my $acl_priv = $self->context->{'current_priv'}; |
384
|
0
|
|
0
|
|
|
|
$log->debug( "My ACL level is $acl_priv and the ACL profile of this resource is " |
385
|
|
|
|
|
|
|
. ( $acl_profile || "undefined" ) ); |
386
|
|
|
|
|
|
|
|
387
|
|
|
|
|
|
|
# compare the two |
388
|
0
|
|
|
|
|
|
my $acl_check_passed = check_acl( profile => $acl_profile, privlevel => $acl_priv ); |
389
|
0
|
0
|
|
|
|
|
if ( $acl_check_passed ) { |
390
|
0
|
|
|
|
|
|
$log->debug( "ACL check passed" ); |
391
|
0
|
|
|
|
|
|
$self->push_onto_context( { 'acl_priv' => $acl_priv } ); |
392
|
0
|
|
|
|
|
|
return 0; |
393
|
|
|
|
|
|
|
} |
394
|
0
|
|
|
|
|
|
$self->mrest_declare_status( explanation => 'DISPATCH_ACL_CHECK_FAILED', |
395
|
|
|
|
|
|
|
args => [ $resource_name ] ); |
396
|
0
|
|
|
|
|
|
return 1; |
397
|
|
|
|
|
|
|
} |
398
|
|
|
|
|
|
|
|
399
|
|
|
|
|
|
|
1; |